As we’re gearing to wards a mobile-first, cloud-first world, the bring your own device (BYOD) trend is causing increasingly technical challenges for IT departments in small and big companies. Indeed, allowing employees to connect to corporate networks with their own devices can sometimes lead to security breaches as workers can lose their mobile devices, access enterprise data through insecure wireless networks or simply use insecure device with outdated software.
A recent report from ZDNet explains that companies are increasingly aware that BYOD and mobile devices are leading to more and more security headaches. The report links to a recent survey from the Ponemon Institute, an independent privacy and information security research organization. In its 2016 State of the Endpoint report, Ponemon Institute asked 18,590 IT security practitioners involved in endpoint security in the US “Where are you seeing the greatest rise in potential IT security risk?”, 86% of them answered “Mobile devices such as smartphones.”
Over the last few years, these growing security challenges led to the development of a healthy market for enterprise security. Right now, all these companies (including Microsoft) are moving from simple Mobile Device Management Solutions (MDM) to more flexible and full-featured Enterprise Mobility Management( (EMM) suites. While MDM focuses on the basics such as secure email, web browsing and data sharing, EMM suites provide more functionalities such as tracking, enterprise data protection and support.
However, according to a survey from US Market research company J Gold Associates with 300 mostly large enterprises, it seems that the majority of organizations choose to deploy the highest value components and to leave the harder to deploy components behind:
If BYOD is here to stay, organizations, IT departments and employees will have to embrace these Enterprise Mobility Suites as the increasing diversity of devices will be followed by even more security threats. Do you think employees will be ready to accept tighter IT control over their devices? Let us know what you think in the comments below.Further reading: EMM, Enterprise Mobility Management, MDM, Mobile Device Management, Security